Dr. Web's count of Macs actively infected with Flashback over time. The "A" marks Apple's release of its Flashback removal tool, and the "B" marks Dr. Web's discovery of another variant of Flashback that led to an increase in its infection count.

===> Flashback has been used for click fraud, as detailed by Symantec’s researchers. The malware redirected traffic from Google search ads to its own pay-per-click ads, generating as much as $10,000 a day. <===

Even with its command and control servers disabled, the infected machines continue to engage in that traffic-hijacking. And with nearly half a million users still infected, Flashback’s authors are still likely profiting from their scheme.

Apple Inc. has a reputation for building secure devices, but don’t become too complacent because ransomware threats to Mac users are on the rise.

While ransomware attacks against Microsoft Windows-based computers and servers remain far more prevalent, security researchers have detected new Mac threats in recent years and expect to see new threats in the future.

Protect your Mac from ransomwareMac users are clearly not free from the threat of ransomware. While not at epidemic proportions, ransomware attacks against Macs have seen widespread success by breaking into systems that were assumed secure. Fortunately, users today have access to a variety of backup options. You can add an extra layer of protection to your Mac computer by stepping beyond the Apple ecosystem of TimeMachine nearline backups and iCloud synchronization and embracing a third-party cloud backup solution.

Apple Inc. has a reputation for building secure devices, but don’t become too complacent because ransomware threats to Mac users are on the rise.

While ransomware attacks against Microsoft Windows-based computers and servers remain far more prevalent, security researchers have detected new Mac threats in recent years and expect to see new threats in the future.

Protect your Mac from ransomwareMac users are clearly not free from the threat of ransomware. While not at epidemic proportions, ransomware attacks against Macs have seen widespread success by breaking into systems that were assumed secure. Fortunately, users today have access to a variety of backup options. You can add an extra layer of protection to your Mac computer by stepping beyond the Apple ecosystem of TimeMachine nearline backups and iCloud synchronization and embracing a third-party cloud backup solution.

Just because you’re using a Mac doesn’t mean you’ve escaped the malware threat.

Two new security threats, a malware-as-a-service (MaaS) platform and a ransomware-as-a-service (RaaS) program, are designed to specifically target machines running Apple macOS.

Two new security threats, a malware-as-a-service (MaaS) platform and a ransomware-as-a-service (RaaS) program, are designed to specifically target machines running Apple macOS.

The MaaS platform, known as "MacSpy," responds to what its authors feel is an ongoing lack of "sophisticated malware for Mac users". Of course, that perception is not entirely accurate. We've seen numerous sophisticatedmalware strainsdeveloped for Macs over the past year or so.

It's true, however, that MacSpy takes this budding proliferation to the next level by making macOS malware more accessible to users with low levels of technical expertise.

Just because you’re using a Mac doesn’t mean you’ve escaped the malware threat.

Two new security threats, a malware-as-a-service (MaaS) platform and a ransomware-as-a-service (RaaS) program, are designed to specifically target machines running Apple macOS.

Two new security threats, a malware-as-a-service (MaaS) platform and a ransomware-as-a-service (RaaS) program, are designed to specifically target machines running Apple macOS.

The MaaS platform, known as "MacSpy," responds to what its authors feel is an ongoing lack of "sophisticated malware for Mac users". Of course, that perception is not entirely accurate. We've seen numerous sophisticatedmalware strainsdeveloped for Macs over the past year or so.

It's true, however, that MacSpy takes this budding proliferation to the next level by making macOS malware more accessible to users with low levels of technical expertise.

It’s been a rough week in Mac security. First, Checkpoint warned users of a Trojan spreading in Europe that was the first of its kind. And now, one of the most prominent video transcoding apps for Mac has a malware problem.

Popular BitTorrent Client Transmission Gets Infected With Malware Again

For the second time in five months, the Transmission BitTorrent client for Mac has been infected…

The developers of the transcoding software Handbrake have issued a statement that warns one of the mirror sites to download the software has been compromised by hackers. The post explains that anyone who has downloaded the software between May 2nd and 6th of this year has a 50/50 chance of being infected. But, it’s probably a good idea just to double check if you’ve downloaded it anytime recently.

It’s been a rough week in Mac security. First, Checkpoint warned users of a Trojan spreading in Europe that was the first of its kind. And now, one of the most prominent video transcoding apps for Mac has a malware problem.

Popular BitTorrent Client Transmission Gets Infected With Malware Again

For the second time in five months, the Transmission BitTorrent client for Mac has been infected…

The developers of the transcoding software Handbrake have issued a statement that warns one of the mirror sites to download the software has been compromised by hackers. The post explains that anyone who has downloaded the software between May 2nd and 6th of this year has a 50/50 chance of being infected. But, it’s probably a good idea just to double check if you’ve downloaded it anytime recently.

Apple’s latest macOS, High Sierra, rolls out today with plenty of nice security upgrades, including invasive ad tracker blocking in Safari and weekly firmware validation. But the new OS apparently comes with a security problem, too—a security researcher at Synack has already discovered a way to snatch passwords from High Sierra.

Apple’s latest macOS, High Sierra, rolls out today with plenty of nice security upgrades, including invasive ad tracker blocking in Safari and weekly firmware validation. But the new OS apparently comes with a security problem, too—a security researcher at Synack has already discovered a way to snatch passwords from High Sierra.

If you're an iPhone user who's downloaded iOS 11, you'll want to pay attention to this recent Tweet from F-Secure's head of hardware security Andrea Barisani.

iOS 11 comes with a new Control Center that opens when you swipe up from the bottom of the screen. But ironically, the app seems to be lacking some control. When you tap the Bluetooth and Wifi icons, while the phone disconnects from any current Bluetooth or Wifi connections, it doesn’t turn off those features completely.

That means new Bluetooth or Wifi connections can still be made. In order to make sure those features are off completely, you’ll need to go into the separate Settings app and turn them off there.

From a security and privacy perspective, it’s important to understand this distinction because turning off Bluetooth and Wifi when you’re not using them prevents your device from broadcasting information about itself.

If you're an iPhone user who's downloaded iOS 11, you'll want to pay attention to this recent Tweet from F-Secure's head of hardware security Andrea Barisani.

iOS 11 comes with a new Control Center that opens when you swipe up from the bottom of the screen. But ironically, the app seems to be lacking some control. When you tap the Bluetooth and Wifi icons, while the phone disconnects from any current Bluetooth or Wifi connections, it doesn’t turn off those features completely.

That means new Bluetooth or Wifi connections can still be made. In order to make sure those features are off completely, you’ll need to go into the separate Settings app and turn them off there.

From a security and privacy perspective, it’s important to understand this distinction because turning off Bluetooth and Wifi when you’re not using them prevents your device from broadcasting information about itself.

Macs are becoming an increasingly big target for malware authors, and a new report has pointed to a massive increase this year in the likes of viruses aimed at Apple’s machines (which were once regarded as relative safe havens in comparison to Windows PCs).

The findings from Malwarebytes show that as of July 2017, there has been a huge leap of 230% in Mac malware compared to the previous year.

Some categories of malicious software are increasing at an even faster rate than this, namely adware and potentially unwanted programs (PUPs) according to the security firm, although it didn’t clarify any percentage rates in these cases.

Malwarebytes also observed that the Mac App Store is currently awash with a ‘tidal wave’ of scam software.

As Betanews reports, the authors of the study looked to the future, predicting that: “In 2018, Mac malware will increase but PUPs will see the largest growth. These are not very well policed and are free to proliferate unchecked.

“Mac users are already experiencing some of this now, with an explosion of fake anti-virus apps in the Mac App Store. These are not well controlled by Apple and not commonly known of even within the security community.”

Macs are becoming an increasingly big target for malware authors, and a new report has pointed to a massive increase this year in the likes of viruses aimed at Apple’s machines (which were once regarded as relative safe havens in comparison to Windows PCs).

The findings from Malwarebytes show that as of July 2017, there has been a huge leap of 230% in Mac malware compared to the previous year.

Some categories of malicious software are increasing at an even faster rate than this, namely adware and potentially unwanted programs (PUPs) according to the security firm, although it didn’t clarify any percentage rates in these cases.

Malwarebytes also observed that the Mac App Store is currently awash with a ‘tidal wave’ of scam software.

As Betanews reports, the authors of the study looked to the future, predicting that: “In 2018, Mac malware will increase but PUPs will see the largest growth. These are not very well policed and are free to proliferate unchecked.

“Mac users are already experiencing some of this now, with an explosion of fake anti-virus apps in the Mac App Store. These are not well controlled by Apple and not commonly known of even within the security community.”

Apple has squashed dozens of security bugs in its latest releases of its iPhone, iPad, and Mac operating systems.

The Cupertino, Calif.-based company rolled out 23 security fixes in iOS 10.3.2 and another 30 fixes in macOS 10.12.5, both of which were released on Monday.

Among the bugs, two bugs in iBooks for iOS could allow an attacker to arbitrarily open websites and execute malicious code at the kernel level. Over a dozen flaws were found in WebKit, which renders websites and pages on iPhones and iPads, that could allow several kinds of cross-site scripting (XSS) attacks.

A separate flaw in iBooks for macOS desktops and notebooks could allow an application to escape its secure sandbox, a technology used to prevent data loss or theft in the case of an app compromise.

Almost half of the bugs found were attributed to Google's Project Zero, the search giant's in-house vulnerability-finding and security team.

Apple has squashed dozens of security bugs in its latest releases of its iPhone, iPad, and Mac operating systems.

The Cupertino, Calif.-based company rolled out 23 security fixes in iOS 10.3.2 and another 30 fixes in macOS 10.12.5, both of which were released on Monday.

Among the bugs, two bugs in iBooks for iOS could allow an attacker to arbitrarily open websites and execute malicious code at the kernel level. Over a dozen flaws were found in WebKit, which renders websites and pages on iPhones and iPads, that could allow several kinds of cross-site scripting (XSS) attacks.

A separate flaw in iBooks for macOS desktops and notebooks could allow an application to escape its secure sandbox, a technology used to prevent data loss or theft in the case of an app compromise.

Almost half of the bugs found were attributed to Google's Project Zero, the search giant's in-house vulnerability-finding and security team.

A mirror download server for the popular tool HandBrake video file-transcoding app has been compromised by hackers, who replaced its Mac edition with malware.The first most Mac users will know about the security incident will be when they visit the app’s website, at https://handbrake.fr, and see a link to a “Security Alert”:

Anyone who has downloaded HandBrake on Mac between [02/May/2017 14:30 UTC] and [06/May/2017 11:00 UTC] needs to verify the SHA1 / 256 sum of the file before running it.

Anyone who has installed HandBrake for Mac needs to verify their system is not infected with a Trojan. You have 50/50 chance if you’ve downloaded HandBrake during this period.

A mirror download server for the popular tool HandBrake video file-transcoding app has been compromised by hackers, who replaced its Mac edition with malware.The first most Mac users will know about the security incident will be when they visit the app’s website, at https://handbrake.fr, and see a link to a “Security Alert”:

Anyone who has downloaded HandBrake on Mac between [02/May/2017 14:30 UTC] and [06/May/2017 11:00 UTC] needs to verify the SHA1 / 256 sum of the file before running it.

Anyone who has installed HandBrake for Mac needs to verify their system is not infected with a Trojan. You have 50/50 chance if you’ve downloaded HandBrake during this period.

Mac users beware as researchers have found yet another reason to rattle the false sense of security some may have concerning Macs and viruses.

Checkpoint researchers spotted a Mac OSX malware, dubbed OSX/Dok that has been signed with an Apple signature and reads HTTPS traffic, Check Point lead researcher Ofer Caspi said in a 27 April blog post.

It is unclear how the Apple signature got into the hands of the malware's developers and that the signature is the reason why the malware has been able to bypass some native Apple protections and malware could allow an attacker to intercept a victim's web communications and worse.

The malware primarily targets European users, mainly in Germany and in Austria, and could allow an attacker to redirect victims to a remote proxy server controlled by its operator, where the attacker could steal banking credentials, hijack online accounts and leak sensitive information.

The malware was spread via phishing campaigns and at the time the malware was detected and analysed, it was still floating under the radar of Apple and by other third party security products leading researchers said.

Mac users beware as researchers have found yet another reason to rattle the false sense of security some may have concerning Macs and viruses.

Checkpoint researchers spotted a Mac OSX malware, dubbed OSX/Dok that has been signed with an Apple signature and reads HTTPS traffic, Check Point lead researcher Ofer Caspi said in a 27 April blog post.

It is unclear how the Apple signature got into the hands of the malware's developers and that the signature is the reason why the malware has been able to bypass some native Apple protections and malware could allow an attacker to intercept a victim's web communications and worse.

The malware primarily targets European users, mainly in Germany and in Austria, and could allow an attacker to redirect victims to a remote proxy server controlled by its operator, where the attacker could steal banking credentials, hijack online accounts and leak sensitive information.

The malware was spread via phishing campaigns and at the time the malware was detected and analysed, it was still floating under the radar of Apple and by other third party security products leading researchers said.

A malware research team has discovered a new piece of Mac malware that reportedly affects all versions of MacOS and is signed with a valid developer certificate authenticated by Apple (via The Hacker News).

The malware has been dubbed "DOK" and is being disseminated through an email phishing campaign which researchers at CheckPoint say is specifically targeting macOS users, making it the first of its kind.

The malware works by gaining administration privileges in order to install a new root certificate on the user's system. This enables it to gain access to all communications between the host Mac and the internet, including traffic flowing through connections encrypted with SSL.

A malware research team has discovered a new piece of Mac malware that reportedly affects all versions of MacOS and is signed with a valid developer certificate authenticated by Apple (via The Hacker News).

The malware has been dubbed "DOK" and is being disseminated through an email phishing campaign which researchers at CheckPoint say is specifically targeting macOS users, making it the first of its kind.

The malware works by gaining administration privileges in order to install a new root certificate on the user's system. This enables it to gain access to all communications between the host Mac and the internet, including traffic flowing through connections encrypted with SSL.

Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.

Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.

Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.